Cryptography Reference
In-Depth Information
First Principal Components Analysis:
A New Side Channel Distinguisher
Youssef Souissi 1 , Maxime Nassar 1 , 2 , Sylvain Guilley 1 ,
Jean-Luc Danger 1 ,andFlorentFlament 1
1 TELECOM ParisTech, CNRS LTCI (UMR 5141),
46 rue Barrault
75 634 Paris Cedex, France
2 BULL TrustWay
Rue Jean Jaures, B.P. 68
78 340 Les Clayes-sous-Bois, France
Abstract. Side Channel Analysis (SCA) are of great concern since they
have shown their eciency in retrieving sensitive information from secure
devices. In this paper we introduce First Principal Components Analy-
sis (FPCA) which consists in evaluating the relevance of a partitioning
using the projection on the first principal directions as a distinguisher.
Indeed, FPCA is a novel application of the Principal Component Anal-
ysis (PCA). In SCA like Template attacks, PCA has been previously
used as a pre-processing tool. The originality of FPCA is to use PCA
no more as a preprocessing tool but as a distinguisher. We conducted all
our experiments in real life context, using a recently introduced practice-
oriented SCA evaluation framework. We show that FPCA is more per-
formant than first-order SCA (DoM, DPA, CPA) when performed on
unprotected DES architecture. Moreover, we outline that FPCA is still
ecient on masked DES implementation, and show how it outperforms
Variance Power Analysis (VPA) which is a known successful attack on
such countermeasures.
Keywords: Principal Component Analysis (PCA), Data Encryption
Standard (DES), Side Channel Attacks (DoM, DPA, CPA, VPA), Mask-
ing countermeasures.
1
Introduction
Different forms of technologies, which require an adequate level of security, are
extensively manipulated around the world. Any violation of such systems could
lead to the loss of sensitive and personal information. In this context, Side Chan-
nel Analysis (SCA) pose a real threat to these technologies since they are non
intrusive, low cost and easily mounted in practice [16]. Actually, SCA exploit
the information leaked from cryptographic devices during the encryption or de-
cryption process to extract the secret information referred to as secret key .This
information is retrieved by analysing the power consumption or the electromag-
netic (EM) radiations of the device under attack. SCA are based on statistical
 
Search WWH ::




Custom Search